US6580820B1 - Digital imaging method and apparatus for detection of document security marks - Google Patents

Digital imaging method and apparatus for detection of document security marks Download PDF

Info

Publication number
US6580820B1
US6580820B1 US09/328,481 US32848199A US6580820B1 US 6580820 B1 US6580820 B1 US 6580820B1 US 32848199 A US32848199 A US 32848199A US 6580820 B1 US6580820 B1 US 6580820B1
Authority
US
United States
Prior art keywords
mark
potential
constituents
color
actual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US09/328,481
Inventor
Zhigang Fan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xerox Corp
Original Assignee
Xerox Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FAN, ZHIGANG
Priority to US09/328,481 priority Critical patent/US6580820B1/en
Application filed by Xerox Corp filed Critical Xerox Corp
Priority to CA002306068A priority patent/CA2306068C/en
Priority to JP2000155767A priority patent/JP2001024888A/en
Priority to BRPI0002536-4A priority patent/BR0002536B1/en
Priority to CNB001183036A priority patent/CN1208743C/en
Priority to ES00112313T priority patent/ES2250050T3/en
Priority to DE60023601T priority patent/DE60023601T2/en
Priority to EP00112313A priority patent/EP1059800B1/en
Assigned to BANK ONE, NA, AS ADMINISTRATIVE AGENT reassignment BANK ONE, NA, AS ADMINISTRATIVE AGENT SECURITY AGREEMENT Assignors: XEROX CORPORATION
Publication of US6580820B1 publication Critical patent/US6580820B1/en
Application granted granted Critical
Assigned to JPMORGAN CHASE BANK, AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: XEROX CORPORATION
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JPMORGAN CHASE BANK, N.A.
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK ONE, NA
Anticipated expiration legal-status Critical
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JPMORGAN CHASE BANK, N.A. AS SUCCESSOR-IN-INTEREST ADMINISTRATIVE AGENT AND COLLATERAL AGENT TO BANK ONE, N.A.
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JPMORGAN CHASE BANK, N.A. AS SUCCESSOR-IN-INTEREST ADMINISTRATIVE AGENT AND COLLATERAL AGENT TO JPMORGAN CHASE BANK
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/0084Determining the necessity for prevention
    • H04N1/00843Determining the necessity for prevention based on recognising a copy prohibited original, e.g. a banknote
    • H04N1/00846Determining the necessity for prevention based on recognising a copy prohibited original, e.g. a banknote based on detection of a dedicated indication, e.g. marks or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00856Preventive measures
    • H04N1/00875Inhibiting reproduction, e.g. by disabling reading or reproduction apparatus

Definitions

  • the present invention relates to the digital image processing arts. More particularly, the application relates to a method and apparatus for preventing or inhibiting effective reproduction of documents such as currency, checks, stock certificates, and any other printed document including a pre-defined security mark printed therein.
  • the subject method and apparatus operate to effect a multi-step review of all digital image data acquired from a printed document to be reproduced for purposes of locating any potential security marks and further examining same for purposes of positively identifying a potential security mark as an actual security mark. If a mark is located and verified to be an authentic security mark, effective reproduction of the printed document will not be permitted and/or other security measures will be taken.
  • a new and improved digital imaging method and apparatus are provided for effective and efficient detection of document security marks to prevent counterfeiting of documents.
  • a method of digital image processing includes, for a printed document potentially including a security mark defined therein by a plurality of actual mark constituents each having a select color, size, and shape and having a select spatial arrangement relative to each other, scanning the document to obtain digital image data corresponding to the printed document, the digital image data defined in terms of a plurality of color input pixel values.
  • the digital image data is processed to identify all portions representing potential constituents of a security mark. For each potential mark constituent represented by the digital image data, it is determined if the potential mark constituent, together with at least one other potential mark constituent represented by the digital image data, defines a potential security mark.
  • a digital image processing method for preventing unauthorized reproduction of a printed document including a security mark defined in terms of a plurality of actual mark constituents having a select color, select dimensions and arranged in a select pattern relative to each other includes scanning said printed document to derive color digital data representing the printed document, the color digital data defined in terms of a plurality of pixels each having a color value. All pixels of the color digital data having a color value representing a color at least approximating the select color of the plurality of actual mark constituents are identified.
  • a binary map of the color digital data is constructed and defined in terms of “on” and “off” pixels, the “on” pixels corresponding to the identified pixels of the color digital data having color values at least approximating the select color of the plurality of actual mark constituents.
  • the binary map is used to identify potential mark constituents defined by the “on” pixels and to identify at least one neighborhood of plural potential mark constituents together defining a potential security mark.
  • the potential security mark is identified as an actual security mark if the potential mark constituents thereof are uniform relative to each other. If an actual security mark is identified, effective duplication of the printed document is prevented.
  • a method of processing digital image data representing a color printed document that includes a security mark for purposes of identifying the security mark represented in the digital image data includes processing the digital image data to identify all portions thereof defining a select color corresponding to the color of the security mark in the printed document. For each portion of the digital image data defining the select color, it is determined if the portion represents a potential constituent of a security mark in the printed document. The method further includes, for each potential security mark constituent identified in the digital image data, determining if the potential security mark constituent, together with at least one other potential security mark constituent, defines a potential security mark.
  • the potential security mark constituents defining each potential security mark are compared to each other to determine if they are uniform in terms of color and size relative to each other.
  • a potential security mark is identified as a security mark represented in the digital image data if the potential security mark constituents of the potential security mark are sufficiently uniform in terms of the least color and size relative to each other.
  • a document reproduction security method includes scanning a printed document to derive color digital image data representative of the printed document.
  • the digital image data is processed to identify all pixels thereof in a select color range used to define a security mark in the printed document.
  • the digital image data is also processed to identify all connected components comprising only pixels of the digital image data in the select color range.
  • the digital image data is processed to identify, as potential mark constituents, all of the connected components having both a size and shape corresponding to a predefined size and shape of actual mark constituents defining the security mark in the printed document.
  • the digital image data is further processed to establish a neighborhood of a select size about each potential mark constituent and to identify, as a potential security mark, all neighborhoods comprising: (i) a number of potential mark constituents greater than or equal to a minimum and less than or equal to a maximum number of actual mark constituents required to define a security mark; and (ii) potential mark constituents arranged relative to each other in a manner corresponding to the actual mark constituents defining the security mark in the printed document.
  • the digital image data is further processed to identify the potential security mark as an actual security mark if the potential mark constituents in the neighborhood are uniform in terms of at least size and color. Effective reproduction of the printed document is prevented if the digital image data includes an actual security mark.
  • One advantage of the present invention is the provision of a digital imaging document security mark detection method and apparatus that effectively and efficiently detect document security marks upon attempted digital reproduction of a printed document including a security mark to prevent production of counterfeit documents.
  • a further advantage of the present invention resides in the provision of a digital imaging method and apparatus that minimize false detection of security marks.
  • Still another advantage is found in the provision of a digital imaging method and apparatus that detect document security marks without regard to shift or rotation of the original document in the document reproduction apparatus.
  • FIG. 1 is a block diagram illustrating an image processing system in accordance with the present invention
  • FIG. 2A illustrates a printed document such as a currency note, including a security mark
  • FIGS. 2B and 2C show enlarged portions of the document illustrated in FIG. 2A for purposes of showing the features of the security mark
  • FIG. 3 is a flow-chart illustrating an overall digital image processing method for detecting document security marks in accordance with the present invention
  • FIG. 4 is a more detailed flow-chart illustrating a digital image processing method of detecting document security marks in accordance with the present invention
  • FIG. 5A is a flow-chart illustrating the binarization step of a digital image processing method for detection of document security marks in accordance with the present invention
  • FIG. 5B illustrates the binary data resulting from application of the binarization method of FIG. 5A to the digital image data obtained from the printed document of FIG. 2A;
  • FIG. 6A is a flow-chart illustrating the micro-detection step of a digital image processing method for detecting document security marks in accordance with the present invention
  • FIG. 6B diagrammatically illustrates a method of identifying connected components of binary image data in accordance with the present invention
  • FIG. 6C diagrammatically illustrates evaluation of connected component size in accordance with the present invention
  • FIG. 6D diagrammatically illustrates a connected component template matching operation in accordance with the present invention
  • FIG. 6E illustrates the portions of the binary image data of FIG. 5B that correspond to potential constituents of a security mark in the printed document of FIG. 2A;
  • FIG. 7A is a flow-chart illustrating a macro-detection operation of a digital image processing method for detecting document security marks in accordance with the present invention
  • FIG. 7B illustrates the portions of the binary image data of FIG. 5B that correspond to potential security marks in the printed document of FIG. 2A;
  • FIG. 8 illustrates a verification operation of a digital imaging method for detecting document security marks in accordance with the present invention.
  • FIG. 9 is a flow-chart illustrating control of the digital image processing system to prevent effective duplication of a document including a security mark.
  • FIG. 1 a digital image processing system 10 in accordance with the present invention is shown in FIG. 1 .
  • each pixel has some gray value between full off and full on.
  • the digital image data is provided in terms of a single monochromatic separation, the image is monochromatic, for example, so called black-and-white image data.
  • a color image results when the data from the separations is combined, for example, red-green-blue (RGB) separations or cyan-magenta-yellow (CMY) separations.
  • RGB red-green-blue
  • CY cyan-magenta-yellow
  • the image signals are input from the scanner 12 to an image processing unit 14 wherein digital image processing, such as security mark identification in accordance with the present invention, is performed.
  • the image processing unit 14 may be provided by any suitable electronic computing apparatus such as an electronic computer, a dedicated electronic circuit, or any other suitable electronic circuit means.
  • the image processing unit 14 outputs data in a suitable format to an image output terminal 16 such as a digital printer and/or visual display.
  • Suitable apparatus for digital image input and/or output include the XEROX Document Center 265DC digital imaging system, Pixelcraft 7650 Pro Imager Scanner, XEROX DocuTech Production Printing System scanners, the XEROX 5775 digital color copier, the XEROX 5760 and 5765 Majestik digital color copiers, or any other suitable color digital scanner/copier. Regardless of the depth d at which each pixel is defined, the location of each pixel in each separation bitmap is also defined, typically in terms of a row “n” and a column “m.”
  • FIG. 2A illustrates a currency note including a security mark imprinted or otherwise included thereon.
  • the illustrated currency note and security mark are for ease of illustrating the invention only, and those of ordinary skill in the art will recognize that the invention is equally applicable to any type of document including any suitable security mark thereon.
  • checks, stock certificates, bonds, and legal documents are some other examples of documents that may include security marks and that may, consequently, be protected from unauthorized reproduction according to the present invention.
  • the currency note 20 is printed on paper 22 or other suitable substrate and comprises various markings, such as denomination markings 24 , text 26 , various decorative images and designs 28 , and a security mark SM used to identify the currency note 20 as an authentic document.
  • the security mark SM is printed in the same or similar manner on the document 20 as the information 24 , 26 , 28 , typically using any suitable color ink.
  • the portion of the currency note 20 including the security mark SM is illustrated and greatly enlarged to show the characteristics of the security mark SM used in the present example.
  • the security mark will likely take any one of a wide variety of alternative forms, and the invention is not to be limited to the illustrated or any other particular security mark.
  • the security mark SM is defined on the note 20 (according to a definition promulgated by the appropriate authorities) by three identical mark constituents MC, each having identical size, shape and color according to the security mark definition. Also, the mark constituents MC are arranged in a select pattern or arrangement as required by the definition of the security mark SM.
  • the mark constituents MC are circular and arranged at the vertices of a right triangle.
  • the mark constituents MC are separated from each other by the distances D 1 , D 2 , D 3 , to define the security mark SM further as having a select overall size and shape.
  • the apparatus and method in accordance with the present invention operate the image processing unit 14 to detect the existence of a security mark SM in a document such as the note 20 scanned by the image input scanner 12 so that the image processing unit can prevent or inhibit unauthorized reproduction of the note 20 or other document being scanned.
  • a security mark SM in a document
  • the subject method hand apparatus may be used to determine the authenticity of a document.
  • the security mark detection method as implemented using the digital imaging processing system 10 comprises: S 1 —obtaining a digital input image, typically through use of the image input scanner 12 ; S 2 —binarization of the digital input image; S 3 micro-detection; S 4 —macro-detection; S 5 —verification; and S 6 —prevention of the effective reproduction of the input document if a security mark is found.
  • the operations S 2 through S 6 are preferably carried out in the image processing unit 14 .
  • the operations S 1 -S 6 are illustrated in further detail in FIG. 4 .
  • the step S 1 comprises scanning an input printed document, such as the currency note 20 , using the input image scanner 12 to derive color digital image data in terms of multiple color separations in a suitable color space, e.g., red R, green G, blue B, or the like.
  • the scanner 12 may derive or deliver the digital image data in terms of any other suitable color space.
  • the binarization step S 2 comprises a first sub-step S 2 a of identifying all pixels in the input digital image as derived by the scanner 12 having or representing a color in a select range.
  • a second sub-step S 2 b constructs a bitmap corresponding to all pixels of the input digital image identified as having a color in the select range.
  • the micro-detection operation S 3 comprises sub-steps S 3 a- S 3 c . More particularly, using the bitmap derived from the binarization operation S 2 , “connected components” in the bitmap are determined S 3 a , and those of a size or shape not corresponding to a mark constituent MC are discarded S 3 b . Remaining connected components are identified as potential mark constituents S 3 c.
  • potential mark constituents in neighborhoods of other potential mark constituents that are over-populated or under-populated relative to a number of mark constituents MC defining a security mark SM are disregarded S 4 a . All remaining potential mark constituents that are not properly spaced from or arranged relative to their neighbor potential mark constituents are also disregarded S 4 b , and only those still remaining are identified as potential security marks S 4 c.
  • any remaining potential security marks are positively identified as actual security marks SM. If an actual security mark SM is identified, the image processing unit 14 prevents effective duplication of the document scanned on the image input scanner 12 , e.g., by completely terminating the digital image processing operation, by inserting a “VOID” message or the like in the output data sent to the image output device 16 , or by otherwise failing to output an exact replica of the input document, such as the currency note 20 .
  • the operations S 1 -S 6 will now be described in further detail with reference to the currency note 20 .
  • the currency note 20 is scanned to obtain digital image data representing same in a suitable color space.
  • This digital image data is fed to the image processing unit 14 for carrying out the operations S 2 -S 6 in accordance with the present invention.
  • the binarization operation S 2 comprises constructing a bitmap 30 defined by a plurality of pixels corresponding respectively in location to the plurality of pixels defining the input digital image of the currency note 20 .
  • the color of each pixel defined by the input digital image is examined by the sub-step S 2 a to identify each pixel having a color in a select range corresponding to the color used for the actual mark constituents MC in the security mark SM.
  • a sub-step S 2 b - 1 For each pixel of input image data in the proper color range, a sub-step S 2 b - 1 sets the correspondingly located pixel in the bitmap to 1 or “on.” All other pixels in the bitmap are set to 0 or “off” by the sub-step S 2 b - 2 .
  • an initialization sub-step may alternatively be used to set all pixels in the bitmap 30 “off” prior to the color-checking sub-step S 2 a .
  • Using the binary digits “1” and “0” to represent “on” and “off” conditions corresponds with conventional computer science notation.
  • the binary digits “0” and “1” may alternatively represent “on” and “off,” respectively, and the invention is not intended to be limited to either notation.
  • a color of a pixel defined by values selected from a particular color space falls within a select color range, i.e., whether the color defined for a pixel in a particular color space is “close enough” to a desired color. If the distance of the actual color from the desired color is greater than a color range threshold T, then the actual color is outside of the range and not “close enough” to the desired color.
  • the pixels of the input digital image representing the currency note 20 are each defined by the actual red, green, and blue values (R,G,B), and if a pixel of a desired color is defined by desired red, green, blue values (R′, G′, B′), then the distance of the color defined by the actual red, green, blue values R,G,B from the desired color defined by the red, green blue values (R′,G′,B′) may be calculated and compared to the threshold T according to:
  • bitmap 30 resulting from binarization S 2 of the input digital image derived by the scanner 12 for the currency note 20 is illustrated.
  • the bitmap 30 is defined by a correspondingly located “on” pixel.
  • One or more of these “on” pixels are generally identified at 34 in FIG. 5 B.
  • all other pixels defining the bitmap remain or are set to an “off” condition.
  • These “off” pixels are collectively identified at 32 in FIG. 5 B.
  • the bitmap 30 includes or identifies only those pixels from the input digital image that represent a color in the select color range that approximates the actual color of the constituents MC of the security mark SM.
  • the bitmap 30 is further processed according to the micro-detection operation S 3 as illustrated in FIGS. 6A-6D in accordance with the present invention.
  • a first sub-step S 3 a identifies all “connected components” in the bitmap 30 .
  • the operation of identifying connected components, by itself, from digital image data such as the bitmap 30 is a conventional operation and well known to those of ordinary skill in the art of digital image processing, in particular, the art of optical character recognition (OCR).
  • OCR optical character recognition
  • connected components in the bitmap 30 are identified as illustrated in FIG. 6 B.
  • Each “on” pixel 34 of the bitmap 30 is placed in the center cell 38 of a 3 ⁇ 3 pixel matrix 36 .
  • each connected component CC of the bitmap 30 comprises a single “on” pixel 34 or a group of “on” pixels 34 , wherein the pixels defining the group are each immediately adjacent to at least one other pixel in the group.
  • each connected component CC in the bitmap 30 is further examined by sub-steps S 3 b - 1 ,S 3 b - 2 to determine if the connected component is a potential mark constituent.
  • the sub-step S 3 b - 1 performs a size-checking operation on each connected component CC to determine if either its column width X or row height Y either (1) exceeds or (2) fails to meet the size of a mark constituent MC. If the connected component CC under consideration by the sub-step S 3 b - 1 is too large or too small in either dimension, it is bypassed.
  • the size checking sub-step S 3 b - 1 compares the width/height dimensions of each connected component CC to acceptable width/height size ranges rather than a select fixed value to account for printing, scanning, and other variations.
  • Each connected component CC that satisfies the size requirements of the sub-step S 3 b - 1 must also survive a template-matching sub-step S 3 b - 2 wherein the connected component CC is compared to and must match at least one template of an actual mark constituent in order for the connected component to be deemed a potential mark constituent b.
  • This template-matching operation is diagrammatically illustrated in FIG. 6 D. Both of the connected components CC 1 and CC 2 satisfy the size checking sub-step S 3 b - 1 .
  • each is then compared to a template 40 including a plurality of cells 42 .
  • Certain cells 42 of the template 40 are target cells 44 , arranged in the shape and size of a mark constituent MC.
  • the template is overlaid with the connected component, and at least a select percentage of the target cells 44 must match or correspond to the pixels 34 defining the connect component CC 1 ,CC 2 .
  • a perfect template match is preferably not required.
  • the connected component CC 1 matches the template 40
  • the connected component CC 2 does not.
  • the sub-step S 3 c identifies only the connected component CC 1 (and all other connected components that satisfy the template-matching operation S 3 b - 2 ) as a potential mark constituent PMC as illustrated in FIG. 6 E.
  • bitmap 30 is further processed according to the macro-detection operation S 4 in an effort to determine which, if any, of the potential mark constituents PMC, with other potential mark constituents, defines a potential security mark PSM.
  • an actual security mark SM is defined by actual marked constituents MC arranged in a specific pattern and spaced from each other by the distances D 1 ,D 2 ,D 3 .
  • the sub-step S 4 a - 1 establishes a neighborhood about the potential mark constituent having a radius equal to or minimally larger than the maximum of the distances D 1 ,D 2 ,D 3 .
  • a sub-step S 4 a - 2 determines the number of potential mark constituents PMC in the neighborhood, including the central or main potential mark constituent about which the neighborhood is established.
  • the sub-step S 4 a - 2 compares the number of potential mark constituents in the neighborhood to the number required to define a security mark.
  • a sub-step S 4 a - 3 disregards or bypasses the potential mark constituent about which the neighborhood is based, and another potential mark constituent PMC is examined beginning at the sub-step S 4 a - 1 .
  • the neighborhood established about a potential mark constituent PMC comprises the number of potential mark constituents required to define a security mark SM
  • the neighborhood is further examined by the sub-step S 4 b - 1 .
  • a neighborhood with one or two extra potential mark constituents relative to the number required to define a security mark SM is deemed to satisfy the sub-step S 4 a - 2 so as to be further processed by the sub-step S 4 b - 1 rather than discarded.
  • the sub-step S 4 b - 1 determines the distances between each potential mark constituent and its neighbors. The sub-step S 4 b - 1 then compares these distances to the predefined distances D 1 ,D 2 ,D 3 of the security mark SM. The distances between potential mark constituents PMC in a neighborhood must equal or be a super-set of the distances D 1 ,D 2 ,D 3 plus or minus a margin of error to account for printing, scanning, or other variations. If not, the sub-step S 4 a - 3 disregards or bypasses the potential mark constituent PMC about which the neighborhood is based, and the next potential mark constituent is examined beginning with the sub-step S 4 a - 1 .
  • a sub-step S 4 b - 2 discards any noise potential mark constituents PMC in the neighborhood and determines the position of the remaining potential mark constituents PMC in the neighborhood relative to each other and compares same to the relative position of the mark constituents MC defining an actual security mark SM. More particularly, the sub-step S 4 b - 2 identifies and then discards noise potential mark constituents PMC from a neighborhood based upon the distances determined by the sub-step S 4 b - 1 . Any potential mark constituents PMC not relevant to the result of obtaining the distances D 1 ,D 2 ,D 3 is deemed to be noise and discarded.
  • the sub-step S 4 b - 2 determines the relative positions of the potential mark constituents PMC in a neighborhood, and compares same to the security mark SM using any other wide variety of methods.
  • a preferred method, which operates independent of any rotation or other shift due to scanning variations at the image input scanner 12 is to use the distances as determined by the sub-step S 4 b - 1 .
  • the potential mark constituents PMC in the neighborhood are examined to determine if the distances separating the potential mark constituents are arranged in the same sequence as the distances D 1 ,D 2 ,D 3 of a security mark SM.
  • Such a method operates independently of the vertical, lateral, or rotational placement of the potential mark constituents PMC in the bitmap 30 .
  • two neighborhoods 50 , 52 (FIG. 6E) of potential mark constituents PMC satisfy the distance requirements of the sub-step S 4 b - 1 .
  • the sub-step S 4 b - 2 examines the relative positions of the potential mark constituents PMC of each neighborhood 50 , 52 , only the neighborhood 50 satisfies the requirement that the potential mark constituents PMC be positioned relative to each other as illustrated in FIG. 2 C—with the distances D 1 ,D 2 ,D 3 encountered sequentially when the potential mark constituents PMC are examined in a clockwise order.
  • each potential security mark PSM is matched against a series of security mark templates, wherein the templates are devised so that, if the potential security mark represents an actual security mark, one template will be matched regardless of any rotational shift of the constituents of the potential security mark—i.e., the entire potential security mark will be compared to a template of an actual security mark, wherein the templates encompass every possible rotational arrangement in which the constituents of the potential security mark could define an actual security mark.
  • the sub-step S 4 a - 3 bypasses the potential mark constituent PMC about which the neighborhood is established and another potential mark constituent PMC is processed beginning with the sub-step S 4 a - 1 .
  • the sub-step S 4 c identifies the neighborhood as a potential security mark PSM (FIG. 7 B), and processing in accordance with the macro-detection operation S 4 continues at S 4 a - 1 for the next potential mark constituent PMC not already part of a potential security mark PSM.
  • the macro-detection operation S 4 results in the identification of any potential security marks PSM, processing continues with a verification operation S 5 in accordance with the present invention as illustrated in FIG. 8 .
  • the binarization S 2 , micro-detection S 3 , and macro-detection S 4 operations all preferably rely upon “ranges” or otherwise allow some variation in connection with the identification of potential mark constituents and potential security marks in terms of color, size, shape, and the like, it is possible that one or more of the potential mark constituents PMC defining a potential security mark PSM are not actual mark constituents MC. Of course, in such case, the potential security mark PSM would not be an actual security mark SM.
  • a verification sub-step S 5 a - 1 examines the color of each potential mark constituent PMC defining the potential security mark PSM, and determines if the color of each potential mark constituent is sufficiently close to or uniform with the color of the other potential mark constituents PMC defining the potential security mark PSM. It is preferred that the potential mark constituents have a color that is equal or close to each other.
  • a dimensional uniformity verification sub-step S 5 a - 2 examines the potential mark constituents PMC for dimensional uniformity relative to each other.
  • the dimensional uniformity verification sub-step S 5 a - 2 examines the column width and/or row height of each potential mark constituent PMC defining the potential security mark PSM for purposes of ensuring that the dimensions of the potential mark constituents are consistent relative to each other.
  • a sub-step S 5 B identifies the potential security mark PSM as an actual security mark SM.
  • a prevention operation S 6 operates to prevent effective reproduction of the document scanned by the image input scanner 12 .
  • a sub-step S 6 a determines if an actual security mark SM has been identified as present in the document being scanned by the input scanner 12 . If no security mark SM has been found, reproduction of the document is permitted. If, on the other hand, a security mark SM is identified, a prevention sub-step S 6 b prevents effective duplication of the document scanned by the input scanner 12 .
  • suitable prevention operations such as disabling the image output device 16 , not sending output data from the image processing unit 14 to the image output device 16 , embedding or otherwise including a message (such as VOID) in the image data sent to the image output device 16 so that the message is visible in the document reproduction, or by any other suitable method that prevents an effective reproduction of the document scanned by the input scanner 12 .

Abstract

A method and apparatus for preventing or inhibiting effective reproduction of documents such as currency, checks, stock certificates, and any other printed document including a pre-defined security mark printed therein. The subject method and apparatus operate to effect a multi-step review of all digital image data acquired from a printed document to be reproduced for purposes of locating any potential security marks and further examining same for purposes of positively identifying a potential security mark as an actual security mark. If a mark is located and verified to be an authentic security mark, effective reproduction of the printed document will not be permitted and/or other security measures will be taken.

Description

BACKGROUND OF THE INVENTION
The present invention relates to the digital image processing arts. More particularly, the application relates to a method and apparatus for preventing or inhibiting effective reproduction of documents such as currency, checks, stock certificates, and any other printed document including a pre-defined security mark printed therein. The subject method and apparatus operate to effect a multi-step review of all digital image data acquired from a printed document to be reproduced for purposes of locating any potential security marks and further examining same for purposes of positively identifying a potential security mark as an actual security mark. If a mark is located and verified to be an authentic security mark, effective reproduction of the printed document will not be permitted and/or other security measures will be taken.
The proliferation of digital image processing systems, such as digital color copiers, that are able to make very high quality reproductions or “copies” of color documents at a low cost has led to use of these machines by criminals for reproduction of currency, checks, stock certificates, legal documents, and other printed documents not legally reproducible. Obviously, any reproductions of these documents are counterfeit and illegal. Unfortunately, there has heretofore not been found a method or apparatus for effectively and efficiently detecting the attempted reproduction of currency and the like so that the reproduction may be thwarted. Without an effective an efficient method/apparatus for detecting currency and other non-reproducible documents, criminals have often been able to produce counterfeit documents almost at will.
Many difficulties are presented during the attempted identification of a security mark in a printed document. The documents, such as currency, are often significantly worn. Also, the document may be placed in the reproduction apparatus at an irregular angle or location that renders detection of the security mark more difficult. Also, improper or erroneous detection of a security mark, and any resulting operations to prevent duplication of the document, are likely to upset and inconvenience those attempting to make legitimate reproductions. Accordingly, erroneous detection of a security mark in a document must be minimized.
Based upon the foregoing and other considerations, a need has been found for a new and improved digital imaging method and apparatus for detection of document security marks to prevent production of counterfeit documents. It has been deemed desirable to develop such a method and apparatus that perform this function in an effective and efficient manner, without intrusion into or interruption of legitimate document reproduction efforts.
SUMMARY OF THE INVENTION
In accordance with the present invention, a new and improved digital imaging method and apparatus are provided for effective and efficient detection of document security marks to prevent counterfeiting of documents.
In accordance with a first aspect of the present invention, a method of digital image processing is provided. The method includes, for a printed document potentially including a security mark defined therein by a plurality of actual mark constituents each having a select color, size, and shape and having a select spatial arrangement relative to each other, scanning the document to obtain digital image data corresponding to the printed document, the digital image data defined in terms of a plurality of color input pixel values. The digital image data is processed to identify all portions representing potential constituents of a security mark. For each potential mark constituent represented by the digital image data, it is determined if the potential mark constituent, together with at least one other potential mark constituent represented by the digital image data, defines a potential security mark. For each potential security mark represented in the digital image data, it is determined if the potential security mark represents an actual security mark present in the printed document. In accordance with another aspect of the present invention, a digital image processing method for preventing unauthorized reproduction of a printed document including a security mark defined in terms of a plurality of actual mark constituents having a select color, select dimensions and arranged in a select pattern relative to each other, includes scanning said printed document to derive color digital data representing the printed document, the color digital data defined in terms of a plurality of pixels each having a color value. All pixels of the color digital data having a color value representing a color at least approximating the select color of the plurality of actual mark constituents are identified. A binary map of the color digital data is constructed and defined in terms of “on” and “off” pixels, the “on” pixels corresponding to the identified pixels of the color digital data having color values at least approximating the select color of the plurality of actual mark constituents. The binary map is used to identify potential mark constituents defined by the “on” pixels and to identify at least one neighborhood of plural potential mark constituents together defining a potential security mark. The potential security mark is identified as an actual security mark if the potential mark constituents thereof are uniform relative to each other. If an actual security mark is identified, effective duplication of the printed document is prevented.
In accordance with still another aspect of the present invention, a method of processing digital image data representing a color printed document that includes a security mark for purposes of identifying the security mark represented in the digital image data includes processing the digital image data to identify all portions thereof defining a select color corresponding to the color of the security mark in the printed document. For each portion of the digital image data defining the select color, it is determined if the portion represents a potential constituent of a security mark in the printed document. The method further includes, for each potential security mark constituent identified in the digital image data, determining if the potential security mark constituent, together with at least one other potential security mark constituent, defines a potential security mark. The potential security mark constituents defining each potential security mark are compared to each other to determine if they are uniform in terms of color and size relative to each other. A potential security mark is identified as a security mark represented in the digital image data if the potential security mark constituents of the potential security mark are sufficiently uniform in terms of the least color and size relative to each other.
In accordance with another aspect of the present invention, a document reproduction security method includes scanning a printed document to derive color digital image data representative of the printed document. The digital image data is processed to identify all pixels thereof in a select color range used to define a security mark in the printed document. The digital image data is also processed to identify all connected components comprising only pixels of the digital image data in the select color range. The digital image data is processed to identify, as potential mark constituents, all of the connected components having both a size and shape corresponding to a predefined size and shape of actual mark constituents defining the security mark in the printed document. The digital image data is further processed to establish a neighborhood of a select size about each potential mark constituent and to identify, as a potential security mark, all neighborhoods comprising: (i) a number of potential mark constituents greater than or equal to a minimum and less than or equal to a maximum number of actual mark constituents required to define a security mark; and (ii) potential mark constituents arranged relative to each other in a manner corresponding to the actual mark constituents defining the security mark in the printed document. For each neighborhood identified as a potential security mark, the digital image data is further processed to identify the potential security mark as an actual security mark if the potential mark constituents in the neighborhood are uniform in terms of at least size and color. Effective reproduction of the printed document is prevented if the digital image data includes an actual security mark.
One advantage of the present invention is the provision of a digital imaging document security mark detection method and apparatus that effectively and efficiently detect document security marks upon attempted digital reproduction of a printed document including a security mark to prevent production of counterfeit documents.
A further advantage of the present invention resides in the provision of a digital imaging method and apparatus that minimize false detection of security marks.
Still another advantage is found in the provision of a digital imaging method and apparatus that detect document security marks without regard to shift or rotation of the original document in the document reproduction apparatus.
Still other benefits and advantages of the invention will become apparent to those of ordinary skill in the art upon reading and understanding the specification together with the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention may take form in various steps and arrangements of steps, and in various components and arrangements of components. The drawings are only for purposes of illustrating preferred embodiments, and it is not intended that they be construed to limit the invention in any way.
FIG. 1 is a block diagram illustrating an image processing system in accordance with the present invention;
FIG. 2A illustrates a printed document such as a currency note, including a security mark;
FIGS. 2B and 2C show enlarged portions of the document illustrated in FIG. 2A for purposes of showing the features of the security mark;
FIG. 3 is a flow-chart illustrating an overall digital image processing method for detecting document security marks in accordance with the present invention;
FIG. 4 is a more detailed flow-chart illustrating a digital image processing method of detecting document security marks in accordance with the present invention;
FIG. 5A is a flow-chart illustrating the binarization step of a digital image processing method for detection of document security marks in accordance with the present invention;
FIG. 5B illustrates the binary data resulting from application of the binarization method of FIG. 5A to the digital image data obtained from the printed document of FIG. 2A;
FIG. 6A is a flow-chart illustrating the micro-detection step of a digital image processing method for detecting document security marks in accordance with the present invention;
FIG. 6B diagrammatically illustrates a method of identifying connected components of binary image data in accordance with the present invention;
FIG. 6C diagrammatically illustrates evaluation of connected component size in accordance with the present invention;
FIG. 6D diagrammatically illustrates a connected component template matching operation in accordance with the present invention;
FIG. 6E illustrates the portions of the binary image data of FIG. 5B that correspond to potential constituents of a security mark in the printed document of FIG. 2A;
FIG. 7A is a flow-chart illustrating a macro-detection operation of a digital image processing method for detecting document security marks in accordance with the present invention;
FIG. 7B illustrates the portions of the binary image data of FIG. 5B that correspond to potential security marks in the printed document of FIG. 2A;
FIG. 8 illustrates a verification operation of a digital imaging method for detecting document security marks in accordance with the present invention; and,
FIG. 9 is a flow-chart illustrating control of the digital image processing system to prevent effective duplication of a document including a security mark.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring now to the drawings where the showings are for purposes of describing preferred embodiments of the invention only and not for purposes of limiting same, a digital image processing system 10 in accordance with the present invention is shown in FIG. 1. An image input scanner 12 derives and delivers digital image data in the form of one or more monochromatic separations, wherein the picture elements or pixels of each separation are defined at a depth of d bits per pixel where d is an integer. Accordingly, each pixel of each separation is defined in terms of d bits per pixel (bit depth=d), and each pixel has some gray value between full off and full on. When the digital image data is provided in terms of a single monochromatic separation, the image is monochromatic, for example, so called black-and-white image data. On the other hand, when the digital image data is provided in terms of two or more monochromatic separations, a color image results when the data from the separations is combined, for example, red-green-blue (RGB) separations or cyan-magenta-yellow (CMY) separations.
The image signals are input from the scanner 12 to an image processing unit 14 wherein digital image processing, such as security mark identification in accordance with the present invention, is performed. The image processing unit 14 may be provided by any suitable electronic computing apparatus such as an electronic computer, a dedicated electronic circuit, or any other suitable electronic circuit means. The image processing unit 14 outputs data in a suitable format to an image output terminal 16 such as a digital printer and/or visual display. Suitable apparatus for digital image input and/or output include the XEROX Document Center 265DC digital imaging system, Pixelcraft 7650 Pro Imager Scanner, XEROX DocuTech Production Printing System scanners, the XEROX 5775 digital color copier, the XEROX 5760 and 5765 Majestik digital color copiers, or any other suitable color digital scanner/copier. Regardless of the depth d at which each pixel is defined, the location of each pixel in each separation bitmap is also defined, typically in terms of a row “n” and a column “m.”
FIG. 2A illustrates a currency note including a security mark imprinted or otherwise included thereon. The illustrated currency note and security mark are for ease of illustrating the invention only, and those of ordinary skill in the art will recognize that the invention is equally applicable to any type of document including any suitable security mark thereon. As noted, checks, stock certificates, bonds, and legal documents are some other examples of documents that may include security marks and that may, consequently, be protected from unauthorized reproduction according to the present invention.
The currency note 20 is printed on paper 22 or other suitable substrate and comprises various markings, such as denomination markings 24, text 26, various decorative images and designs 28, and a security mark SM used to identify the currency note 20 as an authentic document. As illustrated and described herein, the security mark SM is printed in the same or similar manner on the document 20 as the information 24, 26, 28, typically using any suitable color ink.
With reference now to FIGS. 2B and 2C, the portion of the currency note 20 including the security mark SM is illustrated and greatly enlarged to show the characteristics of the security mark SM used in the present example. As noted, in practice, the security mark will likely take any one of a wide variety of alternative forms, and the invention is not to be limited to the illustrated or any other particular security mark. In the present example, the security mark SM is defined on the note 20 (according to a definition promulgated by the appropriate authorities) by three identical mark constituents MC, each having identical size, shape and color according to the security mark definition. Also, the mark constituents MC are arranged in a select pattern or arrangement as required by the definition of the security mark SM. As illustrated herein, the mark constituents MC are circular and arranged at the vertices of a right triangle. The mark constituents MC are separated from each other by the distances D1, D2, D3, to define the security mark SM further as having a select overall size and shape.
The apparatus and method in accordance with the present invention operate the image processing unit 14 to detect the existence of a security mark SM in a document such as the note 20 scanned by the image input scanner 12 so that the image processing unit can prevent or inhibit unauthorized reproduction of the note 20 or other document being scanned. Those of ordinary skill in the art will also recognize that the subject method hand apparatus may be used to determine the authenticity of a document.
With reference now to FIG. 3, a preferred digital image processing method for detection of document security marks is illustrated in accordance with the present invention. The security mark detection method as implemented using the digital imaging processing system 10 comprises: S1—obtaining a digital input image, typically through use of the image input scanner 12; S2—binarization of the digital input image; S3 micro-detection; S4—macro-detection; S5—verification; and S6—prevention of the effective reproduction of the input document if a security mark is found. The operations S2 through S6 are preferably carried out in the image processing unit 14.
The operations S1-S6 are illustrated in further detail in FIG. 4. The step S1 comprises scanning an input printed document, such as the currency note 20, using the input image scanner 12 to derive color digital image data in terms of multiple color separations in a suitable color space, e.g., red R, green G, blue B, or the like. The scanner 12 may derive or deliver the digital image data in terms of any other suitable color space.
The binarization step S2 comprises a first sub-step S2 a of identifying all pixels in the input digital image as derived by the scanner 12 having or representing a color in a select range. A second sub-step S2 b constructs a bitmap corresponding to all pixels of the input digital image identified as having a color in the select range.
The micro-detection operation S3 comprises sub-steps S3 a-S3 c. More particularly, using the bitmap derived from the binarization operation S2, “connected components” in the bitmap are determined S3 a, and those of a size or shape not corresponding to a mark constituent MC are discarded S3 b. Remaining connected components are identified as potential mark constituents S3 c.
In the macro-detection operation S4, potential mark constituents in neighborhoods of other potential mark constituents that are over-populated or under-populated relative to a number of mark constituents MC defining a security mark SM are disregarded S4 a. All remaining potential mark constituents that are not properly spaced from or arranged relative to their neighbor potential mark constituents are also disregarded S4 b, and only those still remaining are identified as potential security marks S4 c.
Thereafter, all potential security marks are further analyzed for uniformity, e.g., uniformity of color, uniformity of size, and those that are not sufficiently uniform are discarded S5 a. Any remaining potential security marks are positively identified as actual security marks SM. If an actual security mark SM is identified, the image processing unit 14 prevents effective duplication of the document scanned on the image input scanner 12, e.g., by completely terminating the digital image processing operation, by inserting a “VOID” message or the like in the output data sent to the image output device 16, or by otherwise failing to output an exact replica of the input document, such as the currency note 20.
The operations S1-S6 will now be described in further detail with reference to the currency note 20. In accordance with the operation S1, the currency note 20 is scanned to obtain digital image data representing same in a suitable color space. This digital image data is fed to the image processing unit 14 for carrying out the operations S2-S6 in accordance with the present invention.
With reference to FIGS. 5A and 5B, the binarization operation S2 comprises constructing a bitmap 30 defined by a plurality of pixels corresponding respectively in location to the plurality of pixels defining the input digital image of the currency note 20. To construct the bitmap 30, the color of each pixel defined by the input digital image is examined by the sub-step S2 a to identify each pixel having a color in a select range corresponding to the color used for the actual mark constituents MC in the security mark SM. For each pixel of input image data in the proper color range, a sub-step S2 b-1 sets the correspondingly located pixel in the bitmap to 1 or “on.” All other pixels in the bitmap are set to 0 or “off” by the sub-step S2 b-2. Of course, an initialization sub-step may alternatively be used to set all pixels in the bitmap 30 “off” prior to the color-checking sub-step S2 a. Using the binary digits “1” and “0” to represent “on” and “off” conditions corresponds with conventional computer science notation. Of course, the binary digits “0” and “1” may alternatively represent “on” and “off,” respectively, and the invention is not intended to be limited to either notation.
Those of ordinary skill in the art will also recognize that many different methods exist for determining if a color of a pixel defined by values selected from a particular color space falls within a select color range, i.e., whether the color defined for a pixel in a particular color space is “close enough” to a desired color. If the distance of the actual color from the desired color is greater than a color range threshold T, then the actual color is outside of the range and not “close enough” to the desired color. For example, if the pixels of the input digital image representing the currency note 20 are each defined by the actual red, green, and blue values (R,G,B), and if a pixel of a desired color is defined by desired red, green, blue values (R′, G′, B′), then the distance of the color defined by the actual red, green, blue values R,G,B from the desired color defined by the red, green blue values (R′,G′,B′) may be calculated and compared to the threshold T according to:
T≧{square root over ((R−R′)2+(G−G′)2+(B−B′)2)}
Of course, those of ordinary skill in the art will recognize that alternative methods exist for determining whether a color value of a pixel of a digital image is within a select color range. The preferred method will vary depending upon the particular color space by which the pixel is defined. It is not intended that the present invention be limited to any particular color comparison method or any particular color space.
Referring now more particularly to FIG. 5B, the bitmap 30 resulting from binarization S2 of the input digital image derived by the scanner 12 for the currency note 20 is illustrated. For each pixel of the input digital image derived by the scanner that represents a color in a select color range encompassing the color used to print the security mark SM, the bitmap 30 is defined by a correspondingly located “on” pixel. One or more of these “on” pixels are generally identified at 34 in FIG. 5B. Likewise, all other pixels defining the bitmap remain or are set to an “off” condition. These “off” pixels are collectively identified at 32 in FIG. 5B. Accordingly, the bitmap 30 includes or identifies only those pixels from the input digital image that represent a color in the select color range that approximates the actual color of the constituents MC of the security mark SM.
The bitmap 30 is further processed according to the micro-detection operation S3 as illustrated in FIGS. 6A-6D in accordance with the present invention. A first sub-step S3 a identifies all “connected components” in the bitmap 30. The operation of identifying connected components, by itself, from digital image data such as the bitmap 30 is a conventional operation and well known to those of ordinary skill in the art of digital image processing, in particular, the art of optical character recognition (OCR). In the preferred embodiment illustrated herein, connected components in the bitmap 30 are identified as illustrated in FIG. 6B. Each “on” pixel 34 of the bitmap 30 is placed in the center cell 38 of a 3×3 pixel matrix 36. All other “on” pixels 34 encompassed in the matrix 36 are deemed to be part of the connected component CC including the pixel 34 in the central matrix cell or location 38. Therefore, each connected component CC of the bitmap 30 comprises a single “on” pixel 34 or a group of “on” pixels 34, wherein the pixels defining the group are each immediately adjacent to at least one other pixel in the group.
Once each connected component CC in the bitmap 30 has been identified, each connected component CC is further examined by sub-steps S3 b-1,S3 b-2 to determine if the connected component is a potential mark constituent. Referring also now to FIG. 6C, the sub-step S3 b-1 performs a size-checking operation on each connected component CC to determine if either its column width X or row height Y either (1) exceeds or (2) fails to meet the size of a mark constituent MC. If the connected component CC under consideration by the sub-step S3 b-1 is too large or too small in either dimension, it is bypassed. Preferably, the size checking sub-step S3 b-1 compares the width/height dimensions of each connected component CC to acceptable width/height size ranges rather than a select fixed value to account for printing, scanning, and other variations.
Each connected component CC that satisfies the size requirements of the sub-step S3 b-1 must also survive a template-matching sub-step S3 b-2 wherein the connected component CC is compared to and must match at least one template of an actual mark constituent in order for the connected component to be deemed a potential mark constituent b. This template-matching operation is diagrammatically illustrated in FIG. 6D. Both of the connected components CC1 and CC2 satisfy the size checking sub-step S3 b-1. Thus, each is then compared to a template 40 including a plurality of cells 42. Certain cells 42 of the template 40 are target cells 44, arranged in the shape and size of a mark constituent MC. In order for a connected component CC1,CC2 to match a template, the template is overlaid with the connected component, and at least a select percentage of the target cells 44 must match or correspond to the pixels 34 defining the connect component CC1,CC2. Again, to account for printing, scanning, and other variations, a perfect template match is preferably not required. In FIG. 6D, the connected component CC1 matches the template 40, while the connected component CC2 does not. Accordingly, the sub-step S3 c identifies only the connected component CC1 (and all other connected components that satisfy the template-matching operation S3 b-2) as a potential mark constituent PMC as illustrated in FIG. 6E.
Referring now to FIGS. 7A and 7B, the bitmap 30 is further processed according to the macro-detection operation S4 in an effort to determine which, if any, of the potential mark constituents PMC, with other potential mark constituents, defines a potential security mark PSM. As noted with reference to FIG. 2C, an actual security mark SM is defined by actual marked constituents MC arranged in a specific pattern and spaced from each other by the distances D1,D2,D3.
Using this information, which is obtained from the definition of the security mark SM, and for each potential mark constituent PMC, the sub-step S4 a-1 establishes a neighborhood about the potential mark constituent having a radius equal to or minimally larger than the maximum of the distances D1,D2,D3. A sub-step S4 a-2 determines the number of potential mark constituents PMC in the neighborhood, including the central or main potential mark constituent about which the neighborhood is established. The sub-step S4 a-2 compares the number of potential mark constituents in the neighborhood to the number required to define a security mark. If a neighborhood has too many or too few potential mark constituents compared to the number required to define a security mark, a sub-step S4 a-3 disregards or bypasses the potential mark constituent about which the neighborhood is based, and another potential mark constituent PMC is examined beginning at the sub-step S4 a-1.
On the other hand, if the neighborhood established about a potential mark constituent PMC comprises the number of potential mark constituents required to define a security mark SM, the neighborhood is further examined by the sub-step S4 b-1. Preferably, to account for the presence of “noise” potential mark constituents PMC, a neighborhood with one or two extra potential mark constituents relative to the number required to define a security mark SM is deemed to satisfy the sub-step S4 a-2 so as to be further processed by the sub-step S4 b-1 rather than discarded.
For neighborhoods having an acceptable number of potential mark constituents PMC, the sub-step S4 b-1 determines the distances between each potential mark constituent and its neighbors. The sub-step S4 b-1 then compares these distances to the predefined distances D1,D2,D3 of the security mark SM. The distances between potential mark constituents PMC in a neighborhood must equal or be a super-set of the distances D1,D2,D3 plus or minus a margin of error to account for printing, scanning, or other variations. If not, the sub-step S4 a-3 disregards or bypasses the potential mark constituent PMC about which the neighborhood is based, and the next potential mark constituent is examined beginning with the sub-step S4 a-1.
However, if the distances between potential mark constituents PMC in a neighborhood equal or are a super-set of the distances D1,D2,D3, a sub-step S4 b-2 discards any noise potential mark constituents PMC in the neighborhood and determines the position of the remaining potential mark constituents PMC in the neighborhood relative to each other and compares same to the relative position of the mark constituents MC defining an actual security mark SM. More particularly, the sub-step S4 b-2 identifies and then discards noise potential mark constituents PMC from a neighborhood based upon the distances determined by the sub-step S4 b-1. Any potential mark constituents PMC not relevant to the result of obtaining the distances D1,D2,D3 is deemed to be noise and discarded.
The sub-step S4 b-2 determines the relative positions of the potential mark constituents PMC in a neighborhood, and compares same to the security mark SM using any other wide variety of methods. A preferred method, which operates independent of any rotation or other shift due to scanning variations at the image input scanner 12 is to use the distances as determined by the sub-step S4 b-1. In such case, the potential mark constituents PMC in the neighborhood are examined to determine if the distances separating the potential mark constituents are arranged in the same sequence as the distances D1,D2,D3 of a security mark SM. Such a method operates independently of the vertical, lateral, or rotational placement of the potential mark constituents PMC in the bitmap 30. By way of example, two neighborhoods 50,52 (FIG. 6E) of potential mark constituents PMC satisfy the distance requirements of the sub-step S4 b-1. However, when the sub-step S4 b-2 examines the relative positions of the potential mark constituents PMC of each neighborhood 50,52, only the neighborhood 50 satisfies the requirement that the potential mark constituents PMC be positioned relative to each other as illustrated in FIG. 2C—with the distances D1,D2,D3 encountered sequentially when the potential mark constituents PMC are examined in a clockwise order. In an alternative embodiment, each potential security mark PSM is matched against a series of security mark templates, wherein the templates are devised so that, if the potential security mark represents an actual security mark, one template will be matched regardless of any rotational shift of the constituents of the potential security mark—i.e., the entire potential security mark will be compared to a template of an actual security mark, wherein the templates encompass every possible rotational arrangement in which the constituents of the potential security mark could define an actual security mark.
If a neighborhood does not satisfy the sub-step S4 b-2, the sub-step S4 a-3 bypasses the potential mark constituent PMC about which the neighborhood is established and another potential mark constituent PMC is processed beginning with the sub-step S4 a-1. On the other hand, if a neighborhood satisfies the sub-step S4 b-2, the sub-step S4 c identifies the neighborhood as a potential security mark PSM (FIG. 7B), and processing in accordance with the macro-detection operation S4 continues at S4 a-1 for the next potential mark constituent PMC not already part of a potential security mark PSM.
If the macro-detection operation S4 results in the identification of any potential security marks PSM, processing continues with a verification operation S5 in accordance with the present invention as illustrated in FIG. 8. Because the binarization S2, micro-detection S3, and macro-detection S4 operations all preferably rely upon “ranges” or otherwise allow some variation in connection with the identification of potential mark constituents and potential security marks in terms of color, size, shape, and the like, it is possible that one or more of the potential mark constituents PMC defining a potential security mark PSM are not actual mark constituents MC. Of course, in such case, the potential security mark PSM would not be an actual security mark SM. Thus, to ensure that a potential security mark PSM is an actual security mark SM, the potential security mark is subjected to a verification operation S5 in accordance with the present invention. More particularly, for each potential security mark PSM, a verification sub-step S5 a-1 examines the color of each potential mark constituent PMC defining the potential security mark PSM, and determines if the color of each potential mark constituent is sufficiently close to or uniform with the color of the other potential mark constituents PMC defining the potential security mark PSM. It is preferred that the potential mark constituents have a color that is equal or close to each other. For example, if two potential mark constituents PMC have respective colors that fall within the color range used in the binarization color-checking sub-step S2 a, but the respective colors thereof are found at extreme opposite ends of the acceptable color range, such potential mark constituents will not be deemed to exhibit sufficient color uniformity relative to each other to be actual mark constituents MC. Any potential security marks PSM not satisfying the color uniformity verification sub-step S5 a-1 are discarded by the sub-step S5 c.
For potential security marks PSM satisfying the color uniformity verification sub-step S5 a-1, a dimensional uniformity verification sub-step S5 a-2 examines the potential mark constituents PMC for dimensional uniformity relative to each other. The dimensional uniformity verification sub-step S5 a-2 examines the column width and/or row height of each potential mark constituent PMC defining the potential security mark PSM for purposes of ensuring that the dimensions of the potential mark constituents are consistent relative to each other. Again, for example, if one potential mark constituent PMC exhibits dimensional characteristics relative to other potential mark constituents that vary by +/−5%, the potential mark constituent will fail the dimensional uniformity verification sub-step S5 a-2, and the sub-step S5 c will discard the relevant potential security mark PSM. If the potential mark constituents PMC defining a potential security mark PSM satisfy the verification operation S5, a sub-step S5B identifies the potential security mark PSM as an actual security mark SM.
Subsequent to the verification operation S5, a prevention operation S6 operates to prevent effective reproduction of the document scanned by the image input scanner 12. A sub-step S6 a determines if an actual security mark SM has been identified as present in the document being scanned by the input scanner 12. If no security mark SM has been found, reproduction of the document is permitted. If, on the other hand, a security mark SM is identified, a prevention sub-step S6 b prevents effective duplication of the document scanned by the input scanner 12. This is accomplished using one or more suitable prevention operations such as disabling the image output device 16, not sending output data from the image processing unit 14 to the image output device 16, embedding or otherwise including a message (such as VOID) in the image data sent to the image output device 16 so that the message is visible in the document reproduction, or by any other suitable method that prevents an effective reproduction of the document scanned by the input scanner 12.
The invention has been described with reference to preferred embodiments. Modifications and alterations will occur to others upon reading and understanding the preceding specification. It is intended that the invention be construed as including all such modifications and alterations insofar as they fall within the scope of the appended claims or equivalents thereof.

Claims (6)

Having thus described the preferred embodiments, what is claimed is:
1. A digital image processing method for preventing unauthorized reproduction of a printed document including a security mark defined in terms of a plurality of actual mark constituents having a select color, select dimensions and arranged in a select pattern relative to each other, said method comprising:
a. scanning said printed document to derive color digital data representing said printed document, said color digital data defined in terms of a plurality of pixels each having a color value;
b. identifying all pixels of said color digital data having a color value representing a color at least approximating said select color of said plurality of actual mark constituents;
c. constructing a binary map of said color digital data defined in terms of “on” and “off” pixels, said “on” pixels corresponding to said identified pixels of said color digital data having color values at least approximating said select color of said plurality of actual mark constituents;
d. using said binary map, identifying potential mark constituents defined by said “on” pixels, said step of identifying potential mark constituents by said “on” pixels comprising:
processing said pixels of said binary map to identify groups of at least one adjacent “on” pixel and identifying each of said groups as a connected component;
comparing dimensions of each connected component to the predefined select dimensions of an actual mark constituent comprising the steps of:
comparing a width of the connected component to minimum and maximum width values of an actual mark constituent;
comparing a height of the connected component to minimum and maximum height values of an actual mark constituent;
only for each connected component having both a width encompassed by said minimum and maximum width values and having a height encompassed by said minimum and maximum height values, comparing the connected component to at least one template, said connected component identified as a potential mark constituent if said connected component matches said at least one template;
e. using said binary map, identifying at least one neighborhood of plural potential mark constituents together defining a potential security mark;
f. identifying said potential security mark as an actual security mark if said potential mark constituents thereof are uniform relative to each other; and
g. preventing effective duplication of said printed document if an actual security mark is identified.
2. The digital image processing method as set forth in claim 1 wherein said step (f) of identifying an actual security mark comprises:
comparing all potential mark constituents of a potential security mark to each other and identifying a potential security mark as an actual security mark if the potential mark constituents defining the potential security mark are uniform relative to each other in terms of at least color and size.
3. A digital image processing method for preventing unauthorized reproduction of a printed document including a security mark defined in terms of a plurality of actual mark constituents having a select color, select dimensions and arranged in a select pattern relative to each other, said method comprising:
a. scanning said printed document to derive color digital data representing said printed document, said color digital data defined in terms of a plurality of pixels each having a color value;
b. identifying all pixels of said color digital data having a color value representing a color at least approximating said select color of said plurality of actual mark constituents;
c. constructing a binary map of said color digital data defined in terms of “on” and “off” pixels, said “on” pixels corresponding to said identified pixels of said color digital data having color values at least approximating said select color of said plurality of actual mark constituents;
d. using said binary map, identifying potential mark constituents defined by said “on” pixels;
e. using said binary map, identifying at least one neighborhood of plural potential mark constituents together defining a potential security mark, said step of identifying at least one neighborhood comprising:
establishing a neighborhood about the potential mark constituent;
counting the number of potential mark constituents located in the neighborhood;
comparing the number of potential mark constituents in the neighborhood to the number of potential mark constituents used to define an actual security mark; and
identifying a neighborhood as a potential security mark only if the number of potential mark constituents therein is equal to or greater than the number of actual mark constituents required to define an actual security mark;
f. identifying said potential security mark as an actual security mark if said potential mark constituents thereof are uniform relative to each other; and
g. preventing effective duplication of said printed document if an actual security mark is identified.
4. The digital image processing method as set forth in claim 3 wherein said neighborhood established about each potential mark constituent has a radius based upon a predefined maximum distance between any two actual mark constituents defining an actual security mark in said printed document.
5. The digital image processing method as set forth in claim 3 further comprising, prior to identifying a neighborhood as a potential security mark:
determining the distances between potential mark constituents in said neighborhood; and
identifying a neighborhood as a potential security mark only if the distances between potential mark constituents define a super-set of distances between actual mark constituents of an actual security mark in said printed document.
6. A document reproduction security method comprising:
scanning a printed document to derive color digital image data representative of said printed document;
processing said digital image data to identify all pixels thereof in a select color range used to define a security mark in said printed document;
processing said digital image data to identify all connected components comprising only pixels of said digital image data in said select color range;
processing said digital image data to identify as potential mark constituents all of said connected components having both a size and shape corresponding to a predefined size and shape of actual mark constituents defining said security mark in said printed document;
processing said digital image data to establish a neighborhood of a select size about each potential mark constituent and determining if a number of potential mark constituents in the neighborhood is greater than or equal to a minimum and less than or equal to a maximum number of actual mark constituents;
only for neighborhoods having greater than or equal to a minimum and less than or equal to a maximum number of potential mark constituents required to define a security mark, identifying the neighborhood as a potential security mark if the potential mark constituents in the neighborhood are arranged relative to each other in a manner corresponding to the actual mark constituents defining said security mark in said printed document;
for each neighborhood identified as a potential security mark, processing said digital image data to identify said potential security mark as an actual security mark if said potential mark constituents in said neighborhood are uniform in terms of at least size and color; and
preventing effective reproduction of said printed document if said digital image data comprises an actual security mark.
US09/328,481 1999-06-09 1999-06-09 Digital imaging method and apparatus for detection of document security marks Expired - Fee Related US6580820B1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
US09/328,481 US6580820B1 (en) 1999-06-09 1999-06-09 Digital imaging method and apparatus for detection of document security marks
CA002306068A CA2306068C (en) 1999-06-09 2000-04-14 Digital imaging method and apparatus for detection of document security marks
JP2000155767A JP2001024888A (en) 1999-06-09 2000-05-26 Method for processing digital image
BRPI0002536-4A BR0002536B1 (en) 1999-06-09 2000-05-31 Method to prevent unauthorized reproduction of a printed document including a security mark.
CNB001183036A CN1208743C (en) 1999-06-09 2000-06-08 Digital imaging method and apparatus for detecting documents safety mark
ES00112313T ES2250050T3 (en) 1999-06-09 2000-06-08 PROCEDURE AND DIGITAL APPARATUS FOR IMAGE FORMATION FOR DETECTION OF SECURITY MARKS IN DOCUMENTS.
DE60023601T DE60023601T2 (en) 1999-06-09 2000-06-08 Digital imaging method and apparatus for detecting document security features
EP00112313A EP1059800B1 (en) 1999-06-09 2000-06-08 Digital imaging method and apparatus for detection of document security marks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/328,481 US6580820B1 (en) 1999-06-09 1999-06-09 Digital imaging method and apparatus for detection of document security marks

Publications (1)

Publication Number Publication Date
US6580820B1 true US6580820B1 (en) 2003-06-17

Family

ID=23281175

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/328,481 Expired - Fee Related US6580820B1 (en) 1999-06-09 1999-06-09 Digital imaging method and apparatus for detection of document security marks

Country Status (8)

Country Link
US (1) US6580820B1 (en)
EP (1) EP1059800B1 (en)
JP (1) JP2001024888A (en)
CN (1) CN1208743C (en)
BR (1) BR0002536B1 (en)
CA (1) CA2306068C (en)
DE (1) DE60023601T2 (en)
ES (1) ES2250050T3 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030023732A1 (en) * 2001-03-13 2003-01-30 Cohen Michael S. Network based centralized control and management system
US6754382B1 (en) * 2000-08-03 2004-06-22 Adobe Systems Incorporated Identifying color spaces from color specifications
US20050157930A1 (en) * 2004-01-20 2005-07-21 Robert Cichielo Method and system for performing image mark recognition
US20060008114A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060008113A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060010116A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060010115A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060007481A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060017752A1 (en) * 2004-04-02 2006-01-26 Kurzweil Raymond C Image resizing for optical character recognition in portable reading machine
US20060061088A1 (en) * 2004-09-23 2006-03-23 Xerox Corporation Method and apparatus for internet coupon fraud deterrence
US20060078225A1 (en) * 2004-05-13 2006-04-13 Pearson Christopher H Method for collecting data for color measurements from a digital electronic image capturing device or system
US20060078199A1 (en) * 2004-05-13 2006-04-13 Bodnar Gary N Method for collecting data for color measurements from a digital electronic image capturing device or system
US20060159337A1 (en) * 2004-11-23 2006-07-20 Pearson Christopher H Method for deriving consistent, repeatable color measurements from data provided by a digital imaging device
US20060216087A1 (en) * 2005-03-23 2006-09-28 Fuji Xerox Co., Ltd. Magnetic element-applied medium, and medium information reading method and device
US20060251320A1 (en) * 2003-03-28 2006-11-09 Carsten Diederichs Methods for qualitative evaluation of a material with at least one identification characteristic
US20060279767A1 (en) * 2005-06-10 2006-12-14 Samsung Electronics Co., Ltd. Method and apparatus for detecting specific pattern and copying machine including the same
US20060294154A1 (en) * 2005-06-23 2006-12-28 Canon Kabushiki Kaisha Document management system, document management method, image forming apparatus, information processing apparatus, and storage medium
EP1755327A1 (en) 2005-08-17 2007-02-21 Xerox Corporation Detection of document security marks using run profiles
US20070064973A1 (en) * 2005-09-13 2007-03-22 Canon Kabushiki Kaisha Adaptive mark placement
US20070195954A1 (en) * 2005-09-26 2007-08-23 Samsung Electronics Co., Ltd. Image forming apparatus for printing security documents by duplex printing and method thereof
US20070253615A1 (en) * 2006-04-26 2007-11-01 Yuan-Hsiang Chang Method and system for banknote recognition
US20080005042A1 (en) * 2006-06-28 2008-01-03 Pitney Bowes Incorporated Postage printing system for printing both postal and non-postal documents
US20080019746A1 (en) * 2006-07-20 2008-01-24 Canon Kabushiki Kaisha Image processing apparatus and control method thereof
US20080069426A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Verification method for determining areas within an image corresponding to monetary banknotes
US20080069423A1 (en) * 2006-09-19 2008-03-20 Xu-Hua Liu Color processing method for identification of areas within an image corresponding to monetary banknotes
US20080069425A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Method for detecting a boundary of a monetary banknote within an image
US20080069427A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Verification method for determining areas within an image corresponding to monetary banknotes
US20080069424A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Method for characterizing texture of areas within an image corresponding to monetary banknotes
US20080093468A1 (en) * 2006-10-18 2008-04-24 Xerox Corporation Security marks simulating natural defects for embedding information in documents
US20080137153A1 (en) * 2006-12-05 2008-06-12 Canon Kabushiki Kaisha Image processing apparatus and method
US20080316510A1 (en) * 2007-06-25 2008-12-25 Canon Kabushiki Kaisha Image processing apparatus and image processing method, computer program and storage medium
US20090103130A1 (en) * 2007-10-23 2009-04-23 Canon Kabushiki Kaisha Image forming apparatus, image forming apparatus control method, program, and storage medium
US20100144387A1 (en) * 2008-12-05 2010-06-10 Chi Mei Communication Systems, Inc. Multifunctional portable electronic device
WO2011116077A1 (en) * 2010-03-19 2011-09-22 Pathway Innovations & Technologies A document camera based multifunction scanner-copier-printer-fax with an automatic paper feeder

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10212734B4 (en) 2002-03-21 2022-06-02 Accu-Sort Systems, Inc. Method and device for identifying and authenticating an object
US7974495B2 (en) 2002-06-10 2011-07-05 Digimarc Corporation Identification and protection of video
JP4086829B2 (en) * 2004-09-22 2008-05-14 シャープ株式会社 Image processing device
US9033371B2 (en) 2005-12-23 2015-05-19 Xerox Corporation Counterfeit prevention using miniature security marks
JP4977368B2 (en) * 2005-12-28 2012-07-18 富士通株式会社 Medium processing apparatus, medium processing method, medium processing system, and computer-readable recording medium recording medium processing program
US7715057B2 (en) 2006-06-22 2010-05-11 Xerox Corporation Hierarchical miniature security marks
JP5092459B2 (en) * 2006-07-18 2012-12-05 富士ゼロックス株式会社 Remote indication system and program for remote indication system
US7676058B2 (en) * 2006-08-11 2010-03-09 Xerox Corporation System and method for detection of miniature security marks
US7792324B2 (en) * 2006-08-11 2010-09-07 Xerox Corporation System and method for embedding miniature security marks
JP4973462B2 (en) * 2006-11-29 2012-07-11 ブラザー工業株式会社 Image reading apparatus and image reading system
US7864979B2 (en) * 2007-01-23 2011-01-04 Xerox Corporation System and method for embedding dispersed miniature security marks
US7949175B2 (en) * 2007-01-23 2011-05-24 Xerox Corporation Counterfeit deterrence using dispersed miniature security marks

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4482971A (en) * 1982-01-18 1984-11-13 The Perkin-Elmer Corporation World wide currency inspection
US5067162A (en) * 1986-06-30 1991-11-19 Identix Incorporated Method and apparatus for verifying identity using image correlation
US5216724A (en) * 1989-02-10 1993-06-01 Canon Kabushiki Kaisha Apparatus for image reading or processing
EP0608188A1 (en) 1993-01-22 1994-07-27 Ugimag S.A. Protecting process for magnetic powders and densified permanent magnets of Nd-Fe-B type against oxidation and atmospheric corrosion
EP0664642A2 (en) 1994-01-20 1995-07-26 Omron Corporation Image processing device and method for identifying an input image, and copier scanner and printer including same
EP0675631A2 (en) 1994-03-29 1995-10-04 Sharp Kabushiki Kaisha Anti-counterfeiting device for use in an image-processing apparatus
EP0751475A2 (en) 1995-06-29 1997-01-02 Omron Corporation Image processing method and device and scanner and printer equipped with same
EP0789270A1 (en) 1996-02-08 1997-08-13 Eastman Kodak Company Copy restrictive documents
US5781653A (en) 1994-08-31 1998-07-14 Ricoh Company, Limited Image processing apparatus for determining copying-inhibited document
US6011866A (en) * 1995-05-22 2000-01-04 Canon Kabushiki Kaisha Template formation method and apparatus
US6067374A (en) * 1997-11-13 2000-05-23 Xerox Corporation Seal detection system and method
US6091844A (en) * 1993-10-14 2000-07-18 Omron Corporation Image processing device and method for identifying an input image and copier including same
US6167147A (en) * 1998-10-26 2000-12-26 The Standard Register Company Security document including pseudo-random image and method of making the same
US6272245B1 (en) * 1998-01-23 2001-08-07 Seiko Epson Corporation Apparatus and method for pattern recognition
US6351550B1 (en) * 1997-09-17 2002-02-26 Fujitsu Limited Seal imprint verifying apparatus
US6393140B1 (en) * 1997-04-16 2002-05-21 Nippon Conlux Co., Ltd. Paper-like piece identifying method and device
US6470096B2 (en) * 1998-11-13 2002-10-22 Xerox Corporation Method for locating user interface tags in a document processing system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06210987A (en) * 1993-01-19 1994-08-02 Canon Inc Recording medium of information made invisible, detecting device of information made invisible and recording agent

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4482971A (en) * 1982-01-18 1984-11-13 The Perkin-Elmer Corporation World wide currency inspection
US5067162A (en) * 1986-06-30 1991-11-19 Identix Incorporated Method and apparatus for verifying identity using image correlation
US5216724A (en) * 1989-02-10 1993-06-01 Canon Kabushiki Kaisha Apparatus for image reading or processing
EP0608188A1 (en) 1993-01-22 1994-07-27 Ugimag S.A. Protecting process for magnetic powders and densified permanent magnets of Nd-Fe-B type against oxidation and atmospheric corrosion
US6091844A (en) * 1993-10-14 2000-07-18 Omron Corporation Image processing device and method for identifying an input image and copier including same
EP0664642A2 (en) 1994-01-20 1995-07-26 Omron Corporation Image processing device and method for identifying an input image, and copier scanner and printer including same
US6289125B1 (en) * 1994-01-20 2001-09-11 Omron Corporation Image processing device and method for indentifying an input image, and copier scanner and printer including same
EP0675631A2 (en) 1994-03-29 1995-10-04 Sharp Kabushiki Kaisha Anti-counterfeiting device for use in an image-processing apparatus
US5781653A (en) 1994-08-31 1998-07-14 Ricoh Company, Limited Image processing apparatus for determining copying-inhibited document
US6011866A (en) * 1995-05-22 2000-01-04 Canon Kabushiki Kaisha Template formation method and apparatus
US6115494A (en) * 1995-06-29 2000-09-05 Omron Corporation Image processing method and device and scanner and printer equipped with same
EP0751475A2 (en) 1995-06-29 1997-01-02 Omron Corporation Image processing method and device and scanner and printer equipped with same
EP0789270A1 (en) 1996-02-08 1997-08-13 Eastman Kodak Company Copy restrictive documents
US6393140B1 (en) * 1997-04-16 2002-05-21 Nippon Conlux Co., Ltd. Paper-like piece identifying method and device
US6351550B1 (en) * 1997-09-17 2002-02-26 Fujitsu Limited Seal imprint verifying apparatus
US6067374A (en) * 1997-11-13 2000-05-23 Xerox Corporation Seal detection system and method
US6272245B1 (en) * 1998-01-23 2001-08-07 Seiko Epson Corporation Apparatus and method for pattern recognition
US6167147A (en) * 1998-10-26 2000-12-26 The Standard Register Company Security document including pseudo-random image and method of making the same
US6470096B2 (en) * 1998-11-13 2002-10-22 Xerox Corporation Method for locating user interface tags in a document processing system

Cited By (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6754382B1 (en) * 2000-08-03 2004-06-22 Adobe Systems Incorporated Identifying color spaces from color specifications
US20030023732A1 (en) * 2001-03-13 2003-01-30 Cohen Michael S. Network based centralized control and management system
US7447353B2 (en) 2003-03-28 2008-11-04 Koenig & Bauer Aktiengesellschaft Methods for qualitative evaluation of a material with at least one identification characteristic
US20060251320A1 (en) * 2003-03-28 2006-11-09 Carsten Diederichs Methods for qualitative evaluation of a material with at least one identification characteristic
US20050157930A1 (en) * 2004-01-20 2005-07-21 Robert Cichielo Method and system for performing image mark recognition
WO2005072136A2 (en) * 2004-01-20 2005-08-11 Educational Testing Service Method and system for performing image mark recognition
WO2005072136A3 (en) * 2004-01-20 2007-07-12 Educational Testing Service Method and system for performing image mark recognition
US7298902B2 (en) * 2004-01-20 2007-11-20 Educational Testing Service Method and system for performing image mark recognition
US7574047B2 (en) 2004-01-20 2009-08-11 Educational Testing Service Method and system for performing image mark recognition
US20080253658A1 (en) * 2004-01-20 2008-10-16 Robert Cichielo Method and system for performing image mark recognition
US8873890B2 (en) * 2004-04-02 2014-10-28 K-Nfb Reading Technology, Inc. Image resizing for optical character recognition in portable reading machine
US20060017752A1 (en) * 2004-04-02 2006-01-26 Kurzweil Raymond C Image resizing for optical character recognition in portable reading machine
US20100021054A1 (en) * 2004-05-13 2010-01-28 Color Saavy Systems Limited Method for collecting data for color measurements from a digital electronic image capturing device or system
US20060078199A1 (en) * 2004-05-13 2006-04-13 Bodnar Gary N Method for collecting data for color measurements from a digital electronic image capturing device or system
US7907780B2 (en) 2004-05-13 2011-03-15 Color Savvy Systems Limited Method for collecting data for color measurements from a digital electronic image capturing device or system
US20060078225A1 (en) * 2004-05-13 2006-04-13 Pearson Christopher H Method for collecting data for color measurements from a digital electronic image capturing device or system
US8320663B2 (en) 2004-05-13 2012-11-27 Color Savvy Systems Limited Method for collecting data for color measurements from a digital electronic image capturing device or system
US7751653B2 (en) 2004-05-13 2010-07-06 Color Savvy Systems Limited Method for collecting data for color measurements from a digital electronic image capturing device or system
US7599559B2 (en) 2004-05-13 2009-10-06 Color Savvy Systems Limited Method for collecting data for color measurements from a digital electronic image capturing device or system
US7860266B2 (en) 2004-07-07 2010-12-28 Canon Kabushiki Kaisha Image processing system and image processing method
US20060008114A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US7640269B2 (en) 2004-07-07 2009-12-29 Canon Kabushiki Kaisha Image processing system and image processing method
US20060008113A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US7596271B2 (en) 2004-07-07 2009-09-29 Canon Kabushiki Kaisha Image processing system and image processing method
US20060010116A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US7545992B2 (en) 2004-07-07 2009-06-09 Canon Kabushiki Kaisha Image processing system and image processing method
US20060010115A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060007481A1 (en) * 2004-07-07 2006-01-12 Canon Kabushiki Kaisha Image processing system and image processing method
US20060061088A1 (en) * 2004-09-23 2006-03-23 Xerox Corporation Method and apparatus for internet coupon fraud deterrence
US20060159337A1 (en) * 2004-11-23 2006-07-20 Pearson Christopher H Method for deriving consistent, repeatable color measurements from data provided by a digital imaging device
US7974466B2 (en) * 2004-11-23 2011-07-05 Color Savvy Systems Limited Method for deriving consistent, repeatable color measurements from data provided by a digital imaging device
US20060216087A1 (en) * 2005-03-23 2006-09-28 Fuji Xerox Co., Ltd. Magnetic element-applied medium, and medium information reading method and device
US7805104B2 (en) * 2005-03-23 2010-09-28 Fuji Xerox Co., Ltd. Magnetic element-applied medium, and medium information reading method and device
US20060279767A1 (en) * 2005-06-10 2006-12-14 Samsung Electronics Co., Ltd. Method and apparatus for detecting specific pattern and copying machine including the same
US7911629B2 (en) * 2005-06-23 2011-03-22 Canon Kabushiki Kaisha Image resolution and text conversion management
US20060294154A1 (en) * 2005-06-23 2006-12-28 Canon Kabushiki Kaisha Document management system, document management method, image forming apparatus, information processing apparatus, and storage medium
EP1755327A1 (en) 2005-08-17 2007-02-21 Xerox Corporation Detection of document security marks using run profiles
US20070041628A1 (en) * 2005-08-17 2007-02-22 Xerox Corporation Detection of document security marks using run profiles
US20070064973A1 (en) * 2005-09-13 2007-03-22 Canon Kabushiki Kaisha Adaptive mark placement
US8121339B2 (en) 2005-09-13 2012-02-21 Canon Kabushiki Kaisha Adaptive mark placement
US20070195954A1 (en) * 2005-09-26 2007-08-23 Samsung Electronics Co., Ltd. Image forming apparatus for printing security documents by duplex printing and method thereof
US20070253615A1 (en) * 2006-04-26 2007-11-01 Yuan-Hsiang Chang Method and system for banknote recognition
US8527285B2 (en) 2006-06-28 2013-09-03 Pitney Bowes Inc. Postage printing system for printing both postal and non-postal documents
US20080005042A1 (en) * 2006-06-28 2008-01-03 Pitney Bowes Incorporated Postage printing system for printing both postal and non-postal documents
US7742197B2 (en) * 2006-07-20 2010-06-22 Canon Kabushiki Kaisha Image processing apparatus that extracts character strings from a image that has had a light color removed, and control method thereof
US20080019746A1 (en) * 2006-07-20 2008-01-24 Canon Kabushiki Kaisha Image processing apparatus and control method thereof
US7916924B2 (en) 2006-09-19 2011-03-29 Primax Electronics Ltd. Color processing method for identification of areas within an image corresponding to monetary banknotes
US20080069423A1 (en) * 2006-09-19 2008-03-20 Xu-Hua Liu Color processing method for identification of areas within an image corresponding to monetary banknotes
US20080069425A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Method for detecting a boundary of a monetary banknote within an image
US7706593B2 (en) * 2006-09-20 2010-04-27 Primax Electronics Ltd. Verification method for determining areas within an image corresponding to monetary banknotes
US7885450B2 (en) 2006-09-20 2011-02-08 Primax Electronics Ltd. Method for characterizing texture of areas within an image corresponding to monetary banknotes
US20080069424A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Method for characterizing texture of areas within an image corresponding to monetary banknotes
US7706592B2 (en) 2006-09-20 2010-04-27 Primax Electronics Ltd. Method for detecting a boundary of a monetary banknote within an image
US20080069427A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Verification method for determining areas within an image corresponding to monetary banknotes
US20080069426A1 (en) * 2006-09-20 2008-03-20 Xu-Hua Liu Verification method for determining areas within an image corresponding to monetary banknotes
US7738690B2 (en) * 2006-09-20 2010-06-15 Primax Electronics Ltd. Verification method for determining areas within an image corresponding to monetary banknotes
US8888010B2 (en) * 2006-10-18 2014-11-18 Xerox Corporation Detection of security marks simulating natural defects for embedding information in documents
US20080093468A1 (en) * 2006-10-18 2008-04-24 Xerox Corporation Security marks simulating natural defects for embedding information in documents
US8056821B2 (en) * 2006-10-18 2011-11-15 Xerox Corporation Security marks simulating natural defects for embedding information in documents
US20080137153A1 (en) * 2006-12-05 2008-06-12 Canon Kabushiki Kaisha Image processing apparatus and method
US8184344B2 (en) * 2007-06-25 2012-05-22 Canon Kabushiki Kaisha Image processing apparatus and image processing method, computer program and storage medium
US20080316510A1 (en) * 2007-06-25 2008-12-25 Canon Kabushiki Kaisha Image processing apparatus and image processing method, computer program and storage medium
US20090103130A1 (en) * 2007-10-23 2009-04-23 Canon Kabushiki Kaisha Image forming apparatus, image forming apparatus control method, program, and storage medium
US8059296B2 (en) * 2007-10-23 2011-11-15 Canon Kabushiki Kaisha Image forming apparatus that synthesizes fiber information extracted from pages of a paper medium having a plurality of pages, and an image forming apparatus control method, a program, and a storage medium relating thereto
US20100144387A1 (en) * 2008-12-05 2010-06-10 Chi Mei Communication Systems, Inc. Multifunctional portable electronic device
WO2011116077A1 (en) * 2010-03-19 2011-09-22 Pathway Innovations & Technologies A document camera based multifunction scanner-copier-printer-fax with an automatic paper feeder
US9137414B2 (en) 2010-03-19 2015-09-15 Pathway Innovations & Technologies, Inc. Document camera based multifunction scanner-copier-printer-fax with an automatic paper feeder

Also Published As

Publication number Publication date
EP1059800A2 (en) 2000-12-13
CN1208743C (en) 2005-06-29
DE60023601T2 (en) 2006-06-01
EP1059800A3 (en) 2002-01-16
DE60023601D1 (en) 2005-12-08
BR0002536B1 (en) 2013-03-05
ES2250050T3 (en) 2006-04-16
CN1277410A (en) 2000-12-20
BR0002536A (en) 2001-01-02
EP1059800B1 (en) 2005-11-02
JP2001024888A (en) 2001-01-26
CA2306068C (en) 2003-04-08
CA2306068A1 (en) 2000-12-09

Similar Documents

Publication Publication Date Title
US6580820B1 (en) Digital imaging method and apparatus for detection of document security marks
US6542629B1 (en) Digital imaging method and apparatus for detection of document security marks
EP1755327B1 (en) Detection of document security marks using run profiles
EP0800123B1 (en) Image recognition method and device and copier and scanner employing same
US6801636B2 (en) Image processing apparatus and method, and storage medium
US6343204B1 (en) Detection and deterrence of counterfeiting of documents with tokens characteristic color and spacing
US8064637B2 (en) Decoding of UV marks using a digital image acquisition device
JPH05300362A (en) Picture processor
US6731784B2 (en) Detection and deterrence of counterfeiting of documents with a seal having characteristic color, size, shape and radial density profile
JP3242971B2 (en) Image processing apparatus and method
KR20010090779A (en) High reliability forensic color marking system
JP2000175031A (en) Image processing unit, image processing method and image input device
US8931697B2 (en) System for detecting reorigination of barcodes
US20100322511A1 (en) Image processing for binarization of image data
US20070086070A1 (en) Full Color Scanning Protection of a Document
WO2006001793A9 (en) Full color scanning protection of document
JP3367959B2 (en) Image processing apparatus and method
US20070133023A1 (en) Document For Determining Interference Scanning Frequencies
MXPA00005611A (en) Digital imaging method and apparatus for detection of document security marks
JPH06110988A (en) Picture processor
JPH06113115A (en) Image forming device
JPH08194412A (en) Color copying machine
KR20080026987A (en) Image certifying device and certifying method thereof
JP2004056184A (en) Image forming apparatus and image processor
JP2001157045A (en) Image processor

Legal Events

Date Code Title Description
AS Assignment

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FAN, ZHIGANG;REEL/FRAME:010481/0776

Effective date: 19990604

AS Assignment

Owner name: BANK ONE, NA, AS ADMINISTRATIVE AGENT, ILLINOIS

Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:013111/0001

Effective date: 20020621

Owner name: BANK ONE, NA, AS ADMINISTRATIVE AGENT,ILLINOIS

Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:013111/0001

Effective date: 20020621

AS Assignment

Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT, TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476

Effective date: 20030625

Owner name: JPMORGAN CHASE BANK, AS COLLATERAL AGENT,TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:015134/0476

Effective date: 20030625

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

REMI Maintenance fee reminder mailed
AS Assignment

Owner name: XEROX CORPORATION, NEW YORK

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK ONE, NA;REEL/FRAME:034827/0290

Effective date: 20030625

Owner name: XEROX CORPORATION, NEW YORK

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:034828/0001

Effective date: 20061204

LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20150617

AS Assignment

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A. AS SUCCESSOR-IN-INTEREST ADMINISTRATIVE AGENT AND COLLATERAL AGENT TO BANK ONE, N.A.;REEL/FRAME:061388/0388

Effective date: 20220822